<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.38 (Ruby 3.3.0) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-munoz-wimse-authorization-evidence-00" category="info" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="WIMSE Authorization Evidence">Signed Authorization-Evidence Records for WIMSE-Authorized AI Agent Actions</title>

    <author initials="C." surname="Munoz" fullname="Christian Munoz">
      <organization>Keel API, Inc.</organization>
      <address>
        <email>christian@keelapi.com</email>
        <uri>https://keelapi.com</uri>
      </address>
    </author>

    <date year="2026" month="May" day="14"/>

    
    
    <keyword>WIMSE</keyword> <keyword>SPIFFE</keyword> <keyword>OAuth</keyword> <keyword>artificial intelligence</keyword> <keyword>AI agent</keyword> <keyword>authorization</keyword> <keyword>audit</keyword> <keyword>evidence</keyword> <keyword>accountability</keyword>

    <abstract>


<?line 50?>

<t>This document specifies a companion profile to the AI Agent
Authentication and Authorization draft <xref target="I-D.klrc-aiagent-auth"/>,
defining a signed authorization-evidence record produced by
WIMSE-authorized AI agent actions. The evidence record (referred to
as a Permit) commits cryptographically to the canonical request
bytes dispatched after authorization, satisfies the audit minimum
requirements enumerated in Section 11 of the companion draft, and
composes with HTTP Message Signatures, OAuth access tokens, and
Shared Signals Framework eventing without requiring modifications
to those existing standards. The profile is anchored in the SCITT
profile defined in <xref target="I-D.munoz-scitt-permit-profile"/>.</t>



    </abstract>



  </front>

  <middle>


<?line 64?>

<section anchor="introduction"><name>Introduction</name>

<t>The AI Agent Authentication and Authorization draft
<xref target="I-D.klrc-aiagent-auth"/> composes existing standards (SPIFFE,
WIMSE, OAuth 2.0, HTTP Message Signatures) to specify how AI agents
obtain identity, authenticate, and acquire runtime authorization
for invocations against tools, services, and large language models.
That draft explicitly states it does not define new protocols.</t>

<t>A consequence of this scoping decision is that the draft does not
define a signed evidence record of the authorization decision
itself. Section 11 of the draft enumerates audit minimum
requirements (authenticated agent identifier, delegated subject,
resource or tool, action requested and authorization decision,
timestamp and correlation identifier, attestation or risk state,
remediation or revocation events) but leaves the format of the
evidence record to implementations.</t>

<t>This document defines such a record. The record is a Permit, as
specified in the companion SCITT profile
<xref target="I-D.munoz-scitt-permit-profile"/>, with this document adding the
WIMSE-specific integration guidance: how Permits represent SPIFFE
identities, how they satisfy the Section 11 audit minimum
requirements, how they integrate with HTTP Message Signatures and
OAuth access tokens, and how Permit lifecycle states bridge to
Shared Signals Framework eventing.</t>

<section anchor="scope"><name>Scope</name>

<t>This profile specifies:</t>

<t><list style="symbols">
  <t>How to populate Permit subject fields with SPIFFE URIs</t>
  <t>A crosswalk from Section 11 of <xref target="I-D.klrc-aiagent-auth"/> to
Permit fields</t>
  <t>Optional integration with HTTP Message Signatures <xref target="RFC9421"/> for
request-level signature coverage that extends Permit's
canonical-body binding to header coverage</t>
  <t>Optional integration with OAuth access tokens through a Permit-ID
claim that allows runtime tokens to reference the signed
authorization-evidence record</t>
  <t>A descriptive (non-normative) bridge between Permit lifecycle
state transitions and Shared Signals Framework / Continuous
Access Evaluation Profile / Risk Incident Sharing eventing</t>
</list></t>

<t>This profile does not specify:</t>

<t><list style="symbols">
  <t>Modifications to <xref target="I-D.klrc-aiagent-auth"/> or any standard it
builds upon</t>
  <t>A new authorization protocol or token format</t>
  <t>Identity management beyond what SPIFFE/WIMSE define</t>
  <t>The Permit object itself; that specification is in
<xref target="KEEL-PERMIT"/> and the SCITT profile in
<xref target="I-D.munoz-scitt-permit-profile"/></t>
</list></t>

</section>
<section anchor="relationship-to-other-specifications"><name>Relationship to Other Specifications</name>

<t>This document is a companion to <xref target="I-D.munoz-scitt-permit-profile"/>.
That document defines the Permit object as a SCITT Signed Statement
and specifies the COSE_Sign1 envelope, Receipt format, and
verification rules. This document extends that profile with
WIMSE-specific integration guidance. An implementation that
conforms to both profiles produces evidence that is consumable by
SCITT-aware verifiers and that satisfies the audit minimum
requirements of <xref target="I-D.klrc-aiagent-auth"/>.</t>

</section>
<section anchor="terminology"><name>Terminology</name>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<?line -18?>

<t>This document uses terminology from <xref target="I-D.klrc-aiagent-auth"/>:
Agent Identifier, Agent Credential, Workload Identity Token (WIT),
Workload Proof Token (WPT), Transaction Token, Agent
Authentication, Agent Authorization, Audit Event.</t>

<t>This document uses terminology from <xref target="KEEL-PERMIT"/> and
<xref target="I-D.munoz-scitt-permit-profile"/>: Permit, Closure Record,
binding_request_hash, dispatch_request_digest_v1, Signed
Statement, Receipt, Transparent Statement.</t>

</section>
</section>
<section anchor="background"><name>Background</name>

<section anchor="the-audit-gap-in-wimse-style-authorization"><name>The Audit Gap in WIMSE-Style Authorization</name>

<t>A WIMSE-authorized AI agent action proceeds as follows: the agent
authenticates via mTLS or WPT, obtains an OAuth access token from
an authorization server, presents the token at a resource server,
and invokes the resource. Each step produces transient
authentication evidence (channel binding, signed proof-of-possession
tokens, validated access tokens) but the authorization decision
itself does not produce a durable signed record.</t>

<t>Section 11 of <xref target="I-D.klrc-aiagent-auth"/> enumerates the minimum
fields an audit event <bcp14>MUST</bcp14> record:</t>

<t><list style="symbols">
  <t>authenticated agent identifier</t>
  <t>delegated subject (user or system) when present</t>
  <t>resource or tool being accessed</t>
  <t>action requested and authorization decision</t>
  <t>timestamp and transaction or request correlation identifier</t>
  <t>attestation or risk state influencing the decision</t>
  <t>remediation or revocation events and their cause</t>
</list></t>

<t>These are evidence requirements without a defined evidence format.
The draft is explicit that the format is left to implementations.</t>

</section>
<section anchor="the-permit-as-evidence-record"><name>The Permit as Evidence Record</name>

<t>A Permit, as specified in <xref target="I-D.munoz-scitt-permit-profile"/> and
<xref target="KEEL-PERMIT"/>, is a Signed Statement that records the
pre-execution authorization decision for an AI agent action. It
satisfies the Section 11 audit minimum requirements directly,
binds to the dispatched request bytes cryptographically, and is
verifiable independently of the issuer. It serves as the audit
evidence record the WIMSE draft requires.</t>

</section>
</section>
<section anchor="the-wimse-authorization-evidence-profile"><name>The WIMSE Authorization-Evidence Profile</name>

<section anchor="spiffe-subject-typing"><name>SPIFFE Subject Typing</name>

<t>The Permit object's subject_type and subject_id fields together
identify the actor that an authorization decision applies to. When
the agent identity is established through SPIFFE/WIMSE:</t>

<t><list style="symbols">
  <t>subject_type <bcp14>MUST</bcp14> be set to "spiffe".</t>
  <t>subject_id <bcp14>MUST</bcp14> be the agent's SPIFFE URI, in the format
spiffe://{trust-domain}/{path}.</t>
</list></t>

<t>Implementations <bcp14>MAY</bcp14> also populate a delegated subject identifier
in the Permit's decision_details.delegated_subject field when the
agent is acting on behalf of another principal. The format of
delegated_subject <bcp14>SHOULD</bcp14> identify the trust domain and identifier
of the delegated principal.</t>

<t>When the agent's WIT is presented at authorization time, the WIT's
serial number or thumbprint <bcp14>MAY</bcp14> be recorded in
decision_details.credential_thumbprint as additional binding
context. This is descriptive metadata; the Permit's
binding_request_hash remains the cryptographic commitment to the
dispatched request.</t>

</section>
<section anchor="audit-minimum-requirements-crosswalk"><name>Audit Minimum Requirements Crosswalk</name>

<t>The following table maps Section 11 of <xref target="I-D.klrc-aiagent-auth"/>
to Permit fields specified in <xref target="KEEL-PERMIT"/>:</t>

<texttable>
      <ttcol align='left'>Section 11 Requirement</ttcol>
      <ttcol align='left'>Permit Field</ttcol>
      <c>authenticated agent identifier</c>
      <c>subject_type + subject_id (SPIFFE URI)</c>
      <c>delegated subject</c>
      <c>decision_details.delegated_subject</c>
      <c>resource or tool being accessed</c>
      <c>resource_provider + resource_model + action_name</c>
      <c>action requested</c>
      <c>action_name + actions_json</c>
      <c>authorization decision</c>
      <c>decision (allow / deny / challenge) + decision_details</c>
      <c>timestamp</c>
      <c>created_at</c>
      <c>transaction or request correlation identifier</c>
      <c>idempotency_key + request_fingerprint</c>
      <c>attestation or risk state</c>
      <c>decision_details.code + routing</c>
      <c>remediation or revocation events</c>
      <c>status lifecycle (evaluated, bound, dispatched, closed, expired, revoked) + chain entries</c>
</texttable>

<t>A Permit emitted by a conforming Issuer is intended to satisfy the
currently enumerated Section 11 audit minimum requirements without
additional structural extension.</t>

</section>
<section anchor="http-message-signature-integration"><name>HTTP Message Signature Integration</name>

<t>Section 9.2.2 of <xref target="I-D.klrc-aiagent-auth"/> describes signing of
HTTP request components via HTTP Message Signatures <xref target="RFC9421"/>.
The mandatory signed components include method, request-target,
content digest, and the WIT itself.</t>

<t>The Permit's binding_request_hash covers the canonical bytes of
the request body but does not directly cover request method,
request-target, or selected headers. For deployments requiring
header coverage:</t>

<t><list style="symbols">
  <t>The Issuer <bcp14>MAY</bcp14> compute an HTTP Message Signature over the full
request and record the signature input string and signature
value in the paired Closure Record's
http_message_signature field.</t>
  <t>The Closure Record's dispatch_request_digest_v1 continues to
commit to the canonical request body bytes; the HTTP Message
Signature commits to the full request envelope.</t>
  <t>Verifiers of the Permit profile <bcp14>MAY</bcp14> use the HTTP Message
Signature as an additional verification step beyond the
binding_request_hash equality check.</t>
</list></t>

<t>This composition layers RFC 9421 signature coverage on top of
Permit's canonical-body binding without requiring expansion of the
canonicalization function in <xref target="KEEL-PERMIT"/>.</t>

</section>
<section anchor="oauth-access-token-composition"><name>OAuth Access Token Composition</name>

<t>OAuth access tokens issued under the
<xref target="I-D.klrc-aiagent-auth"/> model carry standard claims
(client_id, sub, aud, scope) and <bcp14>MAY</bcp14> carry profile-specific claims.</t>

<t>For deployments where a runtime access token should reference the
signed pre-execution authorization-evidence record:</t>

<t><list style="symbols">
  <t>The Authorization Server <bcp14>MAY</bcp14> include a claim named
permit_id whose value is the Permit's id (a UUID).</t>
  <t>A Resource Server validating the access token <bcp14>MAY</bcp14> retrieve the
referenced Permit and verify the relationship between the
in-token claims (client_id, sub, aud, scope) and the Permit's
subject, resource, and decision fields.</t>
  <t>The permit_id claim <bcp14>MUST NOT</bcp14> be treated as a substitute for
Permit verification. Verifiers requiring strong evidence <bcp14>MUST</bcp14>
retrieve and verify the Permit's COSE_Sign1 signature and
Receipt per <xref target="I-D.munoz-scitt-permit-profile"/>.</t>
</list></t>

<t>This composition keeps the OAuth access token in its runtime role
(short-lived authorization grant) while making the durable signed
authorization-evidence record retrievable from the token.</t>

<t>Profile-specific claim registration for permit_id is out of scope
for this document. Implementations <bcp14>MAY</bcp14> use a private claim under
the issuer's namespace until registration is sought.</t>

</section>
<section anchor="transaction-token-linkage"><name>Transaction Token Linkage</name>

<t>Section 10.4 of <xref target="I-D.klrc-aiagent-auth"/> permits Transaction
Tokens (RFC 8693 <xref target="RFC8693"/>) for downscoped per-call context. A
Transaction Token's transaction identifier <bcp14>MAY</bcp14> appear in:</t>

<t><list style="symbols">
  <t>The Permit's idempotency_key field</t>
  <t>The paired Closure Record's correlation_id field</t>
</list></t>

<t>Both fields permit a Verifier consuming Permits and Transaction
Tokens to correlate the runtime per-call context with the durable
signed evidence record. This profile does not require Transaction
Token use; it specifies the correlation pattern for deployments
that adopt them.</t>

</section>
<section anchor="permit-chains-for-multi-step-authorization"><name>Permit Chains for Multi-Step Authorization</name>

<t>The guidance in this document treats a Permit as the
authorization-evidence record for a single authorized AI agent
action. Many WIMSE-authorized deployments involve multi-step agent
workflows or delegated authority, where one authorization decision
leads to a sequence of dependent actions across tools, services, or
models.</t>

<t>The Permit Chains construction specified in <xref target="KEEL-PERMIT"/> extends
a single Permit into an ordered, hash-linked sequence of Permits,
each committing to the preceding Permit's identifier and digest.
WIMSE-style runtime authorization composes with both forms: a single
Permit is sufficient evidence for a single authorized action, and a
Permit Chain is the natural extension for multi-step or delegated
authority, binding the per-step Permits into one verifiable record
of the whole authorized sequence.</t>

<t>The SPIFFE subject typing, audit minimum requirements crosswalk,
HTTP Message Signature integration, and OAuth access token
composition guidance in this document applies per-Permit, and
therefore applies without modification to each Permit in a chain.
This document does not specify the Permit Chain construction itself;
that specification is in <xref target="KEEL-PERMIT"/>.</t>

</section>
<section anchor="lifecycle-state-and-eventing-bridge"><name>Lifecycle State and Eventing Bridge</name>

<t>The Permit object carries a status lifecycle (<xref target="KEEL-PERMIT"/>):</t>

<t><list style="symbols">
  <t>evaluated</t>
  <t>bound</t>
  <t>dispatched</t>
  <t>closed</t>
  <t>expired</t>
  <t>revoked</t>
</list></t>

<t>State transitions emit chain entries with severity and outcome
metadata. <xref target="I-D.klrc-aiagent-auth"/> expects authorization-state
changes (revocation, suspension, attestation degradation) to
propagate as Shared Signals Framework (SSF), Continuous Access
Evaluation Profile (CAEP), or Risk Incident Sharing (RISC)
signals.</t>

<t>A bridge from Permit chain events to SSF / CAEP / RISC signals
<bcp14>SHOULD</bcp14> be provided by deployments requiring real-time
authorization-state propagation. The bridge transforms a chain
entry of severity "warning" or "error" affecting a Permit's
revoked or expired status into an outbound SSF event of the
appropriate type. This profile does not specify the bridge
normatively; it documents the integration pattern.</t>

<t>A future revision of this profile <bcp14>MAY</bcp14> specify normative bridge
event formats once production deployments demonstrate stable
patterns.</t>

</section>
</section>
<section anchor="composition-with-the-scitt-profile"><name>Composition with the SCITT Profile</name>

<t>A Permit emitted under this WIMSE companion profile and signed
under <xref target="I-D.munoz-scitt-permit-profile"/> satisfies both:</t>

<t><list style="symbols">
  <t>SCITT verifiers (via the COSE_Sign1 Signed Statement envelope
and chain-entry Receipt)</t>
  <t><xref target="I-D.klrc-aiagent-auth"/> Section 11 audit minimum requirements</t>
</list></t>

<t>Implementations <bcp14>MAY</bcp14> produce Permits that conform only to this
companion profile (without the SCITT COSE_Sign1 envelope) if SCITT
compatibility is not required. In that case, the Permit's legacy
signature envelope <xref target="KEEL-PERMIT"/> satisfies the integrity
requirement for Section 11 evidence purposes, but the artifact is
not consumable by SCITT-aware verifiers.</t>

<t>A future version of this profile <bcp14>MAY</bcp14> deprecate the legacy-only
mode in favor of SCITT-compatible emission. This profile-00 does
not.</t>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<section anchor="token-lifetime-versus-evidence-persistence"><name>Token Lifetime versus Evidence Persistence</name>

<t>OAuth access tokens, WITs, and WPTs are short-lived runtime
credentials. Permits are long-lived signed evidence records. The
two are linked by the permit_id claim (when present) but their
verification lifetimes are distinct.</t>

<t>Compromise of a runtime credential does not retroactively
invalidate the Permit (because the Permit was signed by the
Issuer at decision time, not by the runtime credential). Compromise
of an Issuer signing key, however, permits forgery of Permits and
<bcp14>SHOULD</bcp14> be addressed through key-rotation procedures specified in
the Issuer's key manifest.</t>

</section>
<section anchor="subject-identifier-disclosure"><name>Subject Identifier Disclosure</name>

<t>A Permit's subject_id, when a SPIFFE URI, identifies the agent's
trust domain and workload path. When a delegated subject is
present, the delegated principal is also identified. Verifiers
processing Permits <bcp14>SHOULD</bcp14> apply access controls appropriate to
the sensitivity of the subject identifiers.</t>

</section>
<section anchor="transaction-token-replay"><name>Transaction Token Replay</name>

<t>Transaction Tokens carry per-call context that should not appear
in long-lived hashes. The Permit's binding_request_hash is
computed over canonical request bytes after volatile-key stripping
(<xref target="KEEL-PERMIT"/>); Transaction Token identifiers are stripped if
they appear in the request body. Transaction Token correlation
recorded in the Permit's idempotency_key field is not subject to
the stripping rules; this is intentional, since the correlation
ID is the same artifact that downstream eventing references.</t>

</section>
<section anchor="http-message-signature-composition"><name>HTTP Message Signature Composition</name>

<t>When an HTTP Message Signature is recorded in the Closure Record,
the signature's signed components include the WIT itself (per
<xref target="I-D.klrc-aiagent-auth"/> Section 9.2.2). The WIT carries the
agent's public key reference; the signature commits to the agent's
authentication context at dispatch time. Verifiers validating both
the Permit and the HTTP Message Signature obtain two independent
cryptographic commitments to the dispatched request.</t>

</section>
<section anchor="ssf-event-integrity"><name>SSF Event Integrity</name>

<t>The descriptive bridge from Permit chain events to SSF events is
not normative in this profile. Deployments that adopt the bridge
<bcp14>MUST</bcp14> ensure that bridge-generated SSF events are produced by a
component with appropriate trust relative to the Permit Issuer
and the SSF transmitter. Bridge components <bcp14>SHOULD</bcp14> sign or
otherwise authenticate the events they generate.</t>

</section>
</section>
<section anchor="privacy-considerations"><name>Privacy Considerations</name>

<section anchor="delegated-subject-identification"><name>Delegated Subject Identification</name>

<t>When a delegated subject is identified in the Permit's
decision_details.delegated_subject, the privacy considerations of
the delegated principal apply. Issuers <bcp14>SHOULD</bcp14> consider whether
direct identifier inclusion is appropriate or whether a
pseudonymized identifier is required, depending on the audience
consuming the Transparent Statement.</t>

</section>
<section anchor="trust-domain-disclosure"><name>Trust Domain Disclosure</name>

<t>A SPIFFE URI in subject_id discloses the agent's trust domain.
The trust domain may identify an organization, a deployment
environment, or a particular system. Verifiers and Transparency
Service operators <bcp14>SHOULD</bcp14> treat trust domain disclosure with
appropriate sensitivity.</t>

</section>
<section anchor="long-lived-identifiers"><name>Long-Lived Identifiers</name>

<t>The combination of subject_id, policy_id, and resource fields
across many Permits supports re-identification of agents and
correlation across requests. Operators <bcp14>SHOULD</bcp14> apply data
minimization and access control to the audit-export delivery
mechanism for Permits and their chain entries.</t>

</section>
</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>This document has no immediate IANA requests. A future revision
<bcp14>MAY</bcp14> request registration of the permit_id OAuth claim and the
http_message_signature Closure Record extension.</t>

</section>
<section anchor="implementation-status"><name>Implementation Status</name>

<t>This section is to be removed before publication as an RFC.</t>

<t>A reference Issuer implementation is published at <xref target="KEEL-PERMIT"/>
under Apache 2.0. SPIFFE subject typing is supported by the open
subject model. The Section 11 audit minimum requirements crosswalk
is satisfied by the Permit fields as deployed. HTTP Message
Signature integration, OAuth permit_id claim, and SSF bridge are
work in progress.</t>

</section>
<section anchor="acknowledgments"><name>Acknowledgments</name>

<t>The author thanks the authors of <xref target="I-D.klrc-aiagent-auth"/> —
Pieter Kasselman, Jeff Lombardo, Yaroslav Rosomakho, Brian
Campbell, and Nick Steele — for the framing of the AI agent
authentication and authorization model that this companion
profile extends. The author also thanks the SCITT working group
and the authors of adjacent profiles
<xref target="I-D.emirdag-scitt-ai-agent-execution"/> and
<xref target="I-D.veridom-omp"/> for related work.</t>

</section>


  </middle>

  <back>


<references title='References' anchor="sec-combined-references">

    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="RFC9052">
  <front>
    <title>CBOR Object Signing and Encryption (COSE): Structures and Process</title>
    <author fullname="J. Schaad" initials="J." surname="Schaad"/>
    <date month="August" year="2022"/>
    <abstract>
      <t>Concise Binary Object Representation (CBOR) is a data format designed for small code size and small message size. There is a need to be able to define basic security services for this data format. This document defines the CBOR Object Signing and Encryption (COSE) protocol. This specification describes how to create and process signatures, message authentication codes, and encryption using CBOR for serialization. This specification additionally describes how to represent cryptographic keys using CBOR.</t>
      <t>This document, along with RFC 9053, obsoletes RFC 8152.</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="96"/>
  <seriesInfo name="RFC" value="9052"/>
  <seriesInfo name="DOI" value="10.17487/RFC9052"/>
</reference>
<reference anchor="RFC9421">
  <front>
    <title>HTTP Message Signatures</title>
    <author fullname="A. Backman" initials="A." role="editor" surname="Backman"/>
    <author fullname="J. Richer" initials="J." role="editor" surname="Richer"/>
    <author fullname="M. Sporny" initials="M." surname="Sporny"/>
    <date month="February" year="2024"/>
    <abstract>
      <t>This document describes a mechanism for creating, encoding, and verifying digital signatures or message authentication codes over components of an HTTP message. This mechanism supports use cases where the full HTTP message may not be known to the signer and where the message may be transformed (e.g., by intermediaries) before reaching the verifier. This document also describes a means for requesting that a signature be applied to a subsequent HTTP message in an ongoing HTTP exchange.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9421"/>
  <seriesInfo name="DOI" value="10.17487/RFC9421"/>
</reference>

<reference anchor="I-D.klrc-aiagent-auth">
   <front>
      <title>AI Agent Authentication and Authorization</title>
      <author fullname="Pieter Kasselman" initials="P." surname="Kasselman">
         <organization>Defakto Security</organization>
      </author>
      <author fullname="Jeff Lombardo" initials="J." surname="Lombardo">
         <organization>AWS</organization>
      </author>
      <author fullname="Yaroslav Rosomakho" initials="Y." surname="Rosomakho">
         <organization>Zscaler</organization>
      </author>
      <author fullname="Brian Campbell" initials="B." surname="Campbell">
         <organization>Ping Identity</organization>
      </author>
      <author fullname="Nick Steele" initials="N." surname="Steele">
         <organization>Open AI</organization>
      </author>
      <date day="30" month="March" year="2026"/>
      <abstract>
	 <t>   This document proposes a model for authentication and authorization
   of AI agent interactions.  It leverages existing standards such as
   the Workload Identity in Multi-System Environments (WIMSE)
   architecture and OAuth 2.0 family of specifications.  Rather than
   defining new protocols, this document describes how existing and
   widely deployed standards can be applied or extended to establish
   agent authentication and authorization.  By doing so, it aims to
   provide a framework within which to use existing standards, identify
   gaps and guide future standardization efforts for agent
   authentication and authorization.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-klrc-aiagent-auth-01"/>
   
</reference>

<reference anchor="I-D.munoz-scitt-permit-profile">
   <front>
      <title>A SCITT Profile for Pre-Execution AI Action Authorization Records</title>
      <author fullname="Christian Munoz" initials="C." surname="Munoz">
         <organization>Keel API, Inc.</organization>
      </author>
      <date day="15" month="May" year="2026"/>
      <abstract>
	 <t>   This document specifies a SCITT (Supply Chain Integrity,
   Transparency, and Trust) profile for pre-execution authorization
   records of AI agent actions.  The profile defines a Signed Statement
   type, the &quot;Pre-Execution Authorization Record&quot; (also called a
   Permit), that records a policy-evaluated decision to allow, deny, or
   challenge an AI agent action before that action is dispatched to a
   model provider, tool, or service.  The profile cryptographically
   binds the authorization decision to the canonical bytes of the
   request that is subsequently dispatched, enabling independently
   verifiable &quot;authorized request equals dispatched request&quot; assertions.
   The profile composes with adjacent profiles for human-authority
   binding, post-execution material-action evidence, and content-refusal
   events, referenced rather than replicated.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-munoz-scitt-permit-profile-00"/>
   
</reference>
<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>
<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>



    </references>

    <references title='Informative References' anchor="sec-informative-references">



<reference anchor="RFC8693">
  <front>
    <title>OAuth 2.0 Token Exchange</title>
    <author fullname="M. Jones" initials="M." surname="Jones"/>
    <author fullname="A. Nadalin" initials="A." surname="Nadalin"/>
    <author fullname="B. Campbell" initials="B." role="editor" surname="Campbell"/>
    <author fullname="J. Bradley" initials="J." surname="Bradley"/>
    <author fullname="C. Mortimore" initials="C." surname="Mortimore"/>
    <date month="January" year="2020"/>
    <abstract>
      <t>This specification defines a protocol for an HTTP- and JSON-based Security Token Service (STS) by defining how to request and obtain security tokens from OAuth 2.0 authorization servers, including security tokens employing impersonation and delegation.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8693"/>
  <seriesInfo name="DOI" value="10.17487/RFC8693"/>
</reference>
<reference anchor="RFC9068">
  <front>
    <title>JSON Web Token (JWT) Profile for OAuth 2.0 Access Tokens</title>
    <author fullname="V. Bertocci" initials="V." surname="Bertocci"/>
    <date month="October" year="2021"/>
    <abstract>
      <t>This specification defines a profile for issuing OAuth 2.0 access tokens in JSON Web Token (JWT) format. Authorization servers and resource servers from different vendors can leverage this profile to issue and consume access tokens in an interoperable manner.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9068"/>
  <seriesInfo name="DOI" value="10.17487/RFC9068"/>
</reference>
<reference anchor="RFC3161">
  <front>
    <title>Internet X.509 Public Key Infrastructure Time-Stamp Protocol (TSP)</title>
    <author fullname="C. Adams" initials="C." surname="Adams"/>
    <author fullname="P. Cain" initials="P." surname="Cain"/>
    <author fullname="D. Pinkas" initials="D." surname="Pinkas"/>
    <author fullname="R. Zuccherato" initials="R." surname="Zuccherato"/>
    <date month="August" year="2001"/>
    <abstract>
      <t>This document describes the format of a request sent to a Time Stamping Authority (TSA) and of the response that is returned. It also establishes several security-relevant requirements for TSA operation, with regards to processing requests to generate responses. [STANDARDS-TRACK]</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="3161"/>
  <seriesInfo name="DOI" value="10.17487/RFC3161"/>
</reference>

<reference anchor="I-D.ietf-scitt-architecture">
   <front>
      <title>An Architecture for Trustworthy and Transparent Digital Supply Chains</title>
      <author fullname="Henk Birkholz" initials="H." surname="Birkholz">
         <organization>Fraunhofer SIT</organization>
      </author>
      <author fullname="Antoine Delignat-Lavaud" initials="A." surname="Delignat-Lavaud">
         <organization>Microsoft Research</organization>
      </author>
      <author fullname="Cedric Fournet" initials="C." surname="Fournet">
         <organization>Microsoft Research</organization>
      </author>
      <author fullname="Yogesh Deshpande" initials="Y." surname="Deshpande">
         <organization>ARM</organization>
      </author>
      <author fullname="Steve Lasker" initials="S." surname="Lasker">
         </author>
      <date day="10" month="October" year="2025"/>
      <abstract>
	 <t>   Traceability in supply chains is a growing security concern.  While
   verifiable data structures have addressed specific issues, such as
   equivocation over digital certificates, they lack a universal
   architecture for all supply chains.  This document defines such an
   architecture for single-issuer signed statement transparency.  It
   ensures extensibility, interoperability between different
   transparency services, and compliance with various auditing
   procedures and regulatory requirements.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-ietf-scitt-architecture-22"/>
   
</reference>

<reference anchor="I-D.emirdag-scitt-ai-agent-execution">
   <front>
      <title>AI Agent Execution Profile of SCITT</title>
      <author fullname="Pinar Emirdag" initials="P." surname="Emirdag">
         <organization>VERIDIC Inc.</organization>
      </author>
      <date day="11" month="April" year="2026"/>
      <abstract>
	 <t>   This document defines a SCITT (Supply Chain Integrity, Transparency,
   and Trust) profile for creating independently verifiable, tamper-
   evident records of autonomous AI agent actions.  The profile defines
   the AgentInteractionRecord (AIR) as the COSE_Sign1 signed statement
   payload for material agent actions; maps SCITT roles to the agent
   execution context, with the Agent Operator as Issuer and an
   independent Evidence Custodian as Transparency Service; specifies
   Registration Policy requirements including hash chain integrity,
   temporal ordering, and sequence completeness; defines a redaction
   receipt mechanism for privacy-preserving evidence custody; and
   provides compliance mappings to EU AI Act Articles 12 and 19, DORA,
   NIST AI RMF, MAS AI Risk Management Guidelines, PCI DSS v4.0, and
   MiFID II.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-emirdag-scitt-ai-agent-execution-00"/>
   
</reference>

<reference anchor="I-D.veridom-omp">
   <front>
      <title>Operating Model Protocol (OMP) Core -- Version 02: Invariant 3 -- Verifiable Delegation Binding</title>
      <author fullname="Tolulope Adebayo" initials="T." surname="Adebayo">
         <organization>Veridom Ltd</organization>
      </author>
      <author fullname="Oluropo Apalowo" initials="O." surname="Apalowo">
         <organization>Veridom Ltd</organization>
      </author>
      <date day="13" month="May" year="2026"/>
      <abstract>
	 <t>   This document obsoletes draft-veridom-omp-00.  The Operating Model
   Protocol (OMP) defines a deterministic routing and tamper-evident
   evidence architecture for consequential AI decisions.  This document
   specifies OMP Core version 01, which adds Invariant 3: Verifiable
   Delegation Binding.  Every ASSISTED or ESCALATED routing state must
   bind the Named Accountable Officer to a verifiable
   DelegationInstrument at the time of decision.  When valid binding
   cannot be established, the system records AUTHORITY_UNBOUND -- a
   sealed, positive evidentiary state.  This update is additive and
   backward-compatible with OMP Core version 00.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-veridom-omp-02"/>
   
</reference>

<reference anchor="KEEL-PERMIT" target="https://github.com/keelapi/keel-permit/blob/1818c3e04eddf9a2ab6231486ca2cdb2d250ec74/spec/permit-chain-v1.md">
  <front>
    <title>Keel Permit Specification</title>
    <author >
      <organization>Keel API, Inc.</organization>
    </author>
    <date year="2026"/>
  </front>
</reference>


    </references>

</references>


<?line 499?>

<section anchor="open-issues-for-01-and-beyond"><name>Open Issues for -01 and Beyond</name>

<t>This section is to be removed before publication as an RFC.</t>

<t>Open issues:</t>

<t><list style="numbers" type="1">
  <t>Whether to specify the permit_id OAuth claim as a normative
addition or to leave it as an implementation pattern.</t>
  <t>Whether to define the http_message_signature field in the
Closure Record normatively, including its exact serialization.</t>
  <t>Whether to specify normative bridge event formats from Permit
chain events to SSF / CAEP / RISC signals.</t>
  <t>The exact registration mechanism for the permit_id claim
(IANA OAuth Parameters registry, private vendor claim, or both).</t>
  <t>Whether to specify a SPIFFE-required mode or to keep SPIFFE
subject typing as optional.</t>
</list></t>

<t>Feedback on any of these is welcome on the WIMSE and SCITT
mailing lists.</t>

</section>


  </back>

<!-- ##markdown-source:
H4sIAAAAAAAAA6Vc63LcyHX+30/RoX8sGc8ML6tdaymXHS5FZRlLK4bkRuVy
uVg9QM8QSwwAowFSY0lVeYg8QJ4lj5Inybl1o4HBjOhKldccYYC+nD6X73zn
YKbTqWqyJreneu8mWxY21Wdtc1/W2d9Nk5XF9OIxS22RWH1tk7JOnV6Utf5w
+e7mYupvxGcu9dnSFo0+S/Apt6fMfF7bRxiV7u0Pqv2geyotk8KsYPa0Notm
umqL8u/Tp2zl7NT01mHlkenRkUpMY5dlvT7VWbEoVVbVp7qpW9ecHB39cHSi
Uvj+VJ8cnXw/PfpuevxCPdj1Eyz+VGk95cXTp5uryzdv+ON7XCB9MnWTLbIk
MzmM3tg8z5Y4L30H2zS4Tb4xXp9cSTP+zq+WLydJ2RaNmWd51qyVco0p0juT
lwWscm2dqrJT/ZemTCbalXVT24WDT+sVfvirUjwPrR3+07Aqd6rPZ/odyoqu
sATP7+vMNZkpom/KemkKWeKp/pO1uT67upzoyyKZ0Q12ZbL8VCf+2X95gHtM
lc2SckU3tDUs7r5pKnd6eBh/qYqyXsHAjxaXdv3m/Iej7078xxcnx/jxcvp6
9pDXydRkJDc6U/8Fn7VLsqaZVrZeZfCnLhcZ6KJSeLD94V9+/8O3YabvX8rH
b4+/DzNltlnIeKZO7rPGJk1bW/+1XWV1apb+jmzKS7IfbdKSfOS+R1tnabma
lqsKL/3p4uLt9Ori+t3l7SlJpDH10jadUJZZc9/OUSZePvRX9nQ4z8v54fHL
45fJt/bohU3TxQ/mxMy/P/n2+MXL7xNzkqTzk/TkuyOb/O7FoatscijSSO5N
Vkwfj2erlCdmO6VTvKJb9A3cjtrqdVDrTlvk/EePvbMQpaZTUNG5a2qTNErd
3mdOg1W2KzRnx+Nbp42GDVagTGC+cky6KXVzb4PxK7Qh+CvL0aDlA7snI9ef
Po3qxZcvE5XaRVZkxRKmc+yNxr2Arskb4UrSNoHb5mvFTsn0nBKNDgZITmmm
b2G1wyH2wcxsXcP9TakMbpRle4Abhr9OJ/W6asplbap72Fqer/3GE1OUBV6C
sf7WWteo+boBWaWZq0yT3OPyF42t+5sA24a/jqSKo5DX0CvY96pdKRwpqy1K
32lbwDHUcFYpWL2+sbQPfXysywUvIBwJSXaCIld4sXQw+BMopv7p9vZKv7PO
gSg0eniDNgEOhjwe+ib4Djb0YAvHz9/cG5QG3Zs7/aYG7wLe8wEkh4cLh4MD
l22jea14ZVWmQQ2dIvHAErT9iF4FvieXZyB88Bl4BQJVM0UCouEN4pZuzi9v
b5W/gfSBv2St2e40vnyZsS6vsjTNrVK/AXVvSD/IONRtpKr6eaqqtqqqDlLe
3KPe58AyYZX0oj6ZHU22HccBqhQb21rfl09Bd50q5w24AY1KCw5gPSFlkqVb
OjE4RNIZXUOUyVZ2EJkwYGfFYymnA+PCeK6BGcscA42tH7PE8uHrHJ0b/H+x
bHGFcK42dzOQnWnEeu3HKofw2IAZwI5R3UF70xL+FmUjB6YL+4SHDDGtxMfV
GcircGgkaHmkvXD2LikrlFwK+3Yo9AwtAmZCReDZ/MBKBg5+YWjGYhGmf4gy
sAIztvliNmJCsilvaG6XOe7Hok/FufDBgDXXE5gvt0v6zrXzX2GuCQzgyrbG
Tdck8Yl4I+8ycJwi3bLuicLzBDGvKroLdlpDhKF74nlN0+BddB3mgVj+wIeD
869smnVfWa8IbM6geXOw5NyaR3FHHHdFPGooZlDTbFXlJBDWp9kwZvBJwem2
CfgXeZDtXgbJOi8La3fKR5ngBDq/Ru7A+wv1dR8wYa/X9FZk0hTVDPfDQUIm
TAjhgWMneSzbLAVvBHERDZCX52DJFRwhjiJoUQwxQ4vBG2HUtXj0NXuwTse2
61L0rF+D3emwyTVv89nRinWeLWyyTsB5innOAc4sMVh/3bPDWf7mN/oGzNLK
qXpHHIAAYLOp/gnXXuqqrNocFy5Ti9JruC9PJf6w1PQv15cOHgQ/UJfOPZn8
QS/qcjUwyO3uFlav/TQ8PIz2vsJnBaj7Y9wpxE+fBJ3CkKDoMKaY4TQHGeTk
XOhWUEHAgfg0OST7sbEFbIlX8I2DB0Pwn87LdK3nWcFKVup7a1II+n6EnQsd
OVGYsS7b5X2wkenla5wvN9mKVwMYpHxywd37x0pNUIbMFRWRPaXSuzEUnUpq
XVJnFcJtvQ/7mgZwf+D1Z26bJ2uLDTWD8UnRIAMzhcskxoBObtW2Q31eorq1
ZYuCPOPNXzyavGXJXInSHepr9GSAWsnoaESUsVfXgY6GICSBlFT1XYxMUEbb
dQzcoynWIY5ryuXmbYa63FYQRVBSGNn6ztrHOfbwcBTiQuH2SwnaemUKmIqc
0dyuS5DOEx4kG8chp8jsN+Ep9JQi5ZINisPXKz59F2N+9KUZIv9Pn6JEBTaD
JxDwVAe4+NaveVFyA9cSadx9VqHg3sNwdT/jcEPfn/UThSDu3bCN0cUwfjQb
YiB0zhsSruIGNQ+fUrjfLlvBZ8/f31zc4X3HEN7BuMGpTZDFsKDnckQMeDHh
C/Ks29wSSo235c2f5O9lifb7nHgy02fFIGjSQADUKcklrZyX4AZkZOfTGteh
HJoZloQwql2ZOcwPKQ/JYmqewNA078LWTo4eNeW5ecYu18sx4RYPoijzcrlm
JP0AkeuJCKG9d7/c3O5N+K/++T19vr74918ury9e4+ebn87evg0flNxx89P7
X96+7j51T56/f/fu4ufX/DBc1b1Lau/d2Z/3OOztvb+6vXz/89nbPUYOvaBf
U4I6t3QoNURxwlpOsa+bM9r48fzqf/77+AVs/58gMpwcH/8AtsP/eHn8uxfw
jydAfDxbWQDm5X9i4FamqqxBbI0OGeJBlTUGETWoqYOAXEAgqC2I75//gpL5
66n+/Typjl/8QS7ghnsXvcx6F0lmm1c2HmYhjlwamSZIs3d9IOn+es/+3Pu3
l3t08fd/zBGgT49f/vEPaugXWsyUmk6HOPhv1blTxVnaZYRx+co5hBS8ZgBI
f4Bgkpcm7dzsLbnf/Q+XtweQfPmvIZyAgvvvruA7fYuxSoA4fTEZpTAmUbYY
5e9nZEkXGIU20O+2nW5452eA2dMAks/z0iEqYRJ2ogRt3Al6ubs37n4SeIdw
Oc2W+OfxeCIOUwWHGVyhCKMCe8EQ679Hs9c/muRhCWAEVktOADNo2vu/mgr1
nr3fTbPObV9GmPF9jY9BL5dYCx7EIKtMmOaUPRUdRZxsOf2YGb26fXuDURbO
cKI5L0ZvNwKiSOoQEwahGnNd1CWB9OwX+QGEVToka3IjRRXMnR/Eh/obZvrC
QHYD6VvVOWsGQIOlc6YlXnw/uTdFAThTzm/is9kKVXQK/6sAHcMuUIQe3wMu
ylJOOGOYyInbV3PeDhXJOmGbaVtTBJHJJUNT6rlgPMqWcX4fUgT2k9RRSQim
aXJ1PAUBst05NNywkUTrfTCqGg/erUHiqwNywv4Q4Ylhjg1OnzhEEpdFhPsP
5Nxwdz/pbiJfQRk0jbElF8e5tiXjWK3IkQGRZDSe8mtpusdzGeQVBsRBQdhZ
inIRoI9iuifpTCDRwn0MfmYUx5n/yFzgdToGRpgA+C63i2Y89RevIDjNOD2o
F6Ej6DJ93cv0v+4AxU/2fOeEQeYQAPKyaylSYaoP+tGR+1sOm6pZoLAD1zTT
l43qo6dtWX1f6Cl8Spp8zR7aeaI4IoS9+jBTvEEtM9LInIBSMlMYyVaAP2EG
ACDCW2XOtbbGhbKzIi8aYN4mbwPfSJpBBy6rpiOkExwp03W1P0nImB3ghP5G
bPN2XUkmNkDr3zhvv3fNurK0L38hSz1HAJu3mFcIrSIUCpwCmjLluluPDuBX
TqdTzvQHcAgqhI5AlpJeg+3N88yh8H1mHedd5JR6KyWPNccgQEq/56pssbB7
s+g+2IC/K8wKG+7IjomnsiQXhCSZRjk9PPxEpcppWq4gfn05/ASacY8o+7Jv
XBowFwBLF9EsZsQ3Rq5HZvQcRZDUXWohVOZuFp6+6zE17E7RZER6jswAnBRI
eW7vDUQR0DoDQQQzwApy8CSrTM6cXuAL1ebwgkB7Z0u717x7VvZuB56TDbvs
5lLqg6wySBtgnqb0n+IAOvVmoCvoyCei+7ffOAWWgnVdCF9zDijNPXzESRoS
99zbCzkotSHAJKDPu+hJTEvTNBOKR0I7ZncN5I2SSiJEjDiWFQwIMd286p3Y
KKzD0EBAh4jR2F9IgYq9Hzkatelo2EczansnLus6dlnnnpBjG2YgRhGKnM/K
VO65LB0Wfnoc3dDf9xw5GN7neORoVfqzH+cNKehn9Xk6ndJ/8MxuBAHP9qz5
t7HR7ncWeoCjjhjU5+fYDT76FdShuzvuIKChK61hMeEalVbgAkecO6zh07Ab
UOVz7xb/gLv71cFtXh4j/rHbiN4nxlAfwpViDX8Ahua5LZb2AMYbbpfG7CDQ
Z1A6S5s3vO9/CA/B4/CPVVU2EEjWd8ga/NY/cgewZImZORoRbWQrcho5lATk
h2MBxkGx84l8BUR9puFaF5Hk+5Z5R5tO9BwznUkUrSc6gcQL/wI6At2EDzjo
g01RcFSfBzDc1BiGPndQR1v4v4aq0kSHEc2Di7ykoM2cHTJKVHSOiwcqaeua
43xU+30e9hDApyJf5MDZYg8EfCQKCwXIDmGcIMeKqeevunTgh9nJ7GR3RuA5
FUc5BYWOhaI5OvUAJShooZjKPYOgZ3y6QjIW0MDaZyvRQBAb8jYlb3pf0tkw
l88dGhN2wcgoUho8CZwoBQ6uCMbABULKqAMmIt8NKv6M32CXnBYKqKNKQBvX
QwUQ8iDhRlmxGqyYchxwNgmeOpcR3Ey/gauAAPNyzQcdyu5qUGkgKIP7ET3D
kIbiahE7FNvOnBZGUKXN864iQtKK0GNXGskKGBF1i9wdwjr/FTyN1mQ9+KkM
Gs2AvaDqCTbP3K14LXfd0BQ2ZrKL4WM7+A00MqwoEBzEYglFxq19GnJQeIQc
gWPRwOM3URmIe0BkJBRRGMSzyrje/wjsq2AY8QSeLMajgLRt92SGk+fOfnvM
NJENUj1AV6HHtRU+G+wzA/dkkwfPT3G7Ao2rc7PGhYKhabS0saIXcfcVqncw
jS31rs1eEHCVhjyNryGHJ32IWrQFe5ZNUMDeiQkdKQwxcXfebUCN1UE5IUo1
eHBW5x29Gxx6E1PXUbWH6mtO7Sc5UjgAFiYICbDdAj9hSfSAlJ2Mih6Vs+3Y
fx4CtjC02CdkgpFf8g0aMVXlQH552q/dqcALbc1hh3W8YPz9PpYbYrJo1d5d
GqklIp7A8iBn3QiPnqhrR0zY9bMJRE9G//LL5euDGVXCrj3+kSmEp/LkRm+P
OH1tMVA+WlHesN80sAcgXdL4tXBtUf3JVx/52ayY8rgscf3VQ+uhbB26MwIa
49jQsQKEXr0f6uTDcvPkPWV/jI24NAXDOkg70d1ycVk2FpvxLHIVnc2AMy2p
sClHilOQjERkA9GEQ4lqXJ0VI2miQ6ULVv+83qkNP/FgbcVKMEKwYktS09Wg
6zK3ah9UuW6mOWQ4Q3YNQEXRIHGXUU7xECiwHhWpdnf7iTjoAaLVA30Ly78a
tUZ4Zplhb2Pj2Z7uNGG76LnAS5GmUKNUr4Y002M5Obpxg5npIyJTnoW8jup4
GTgatC4IV7B6FFHeXwg2PyETIenZRjlCv82KBwwPHSd7NHuxG4NV0rESDaZu
2Tfuo6/HBlrGV/jpy5cDEkdaPhW0/RQHmCZUyvKp65naWNk3rpcAREif+Apf
EgveKPIf/TSAbMxb2DhOiHOKwBkp9SPWSiXBrMR1BKuSCinql2/hQeMZEQqE
dD8+x2Wvy0M5+JaioK1qvAdNUv2NdgRB6ZtrQFV6he1z/cJ1nElVmBPVrLlR
RFHMjaVlRVTtitVI3M35PfEF+Mi7Nm+y6Q0ih0F9BsXuK9SbxVNya12XlnCL
XzFP4lLBkotl3hUlorqP8uTqO2yz2CgPxQETay458iS0fkI+PAQ2kCyo+4UE
4pN3GQbbIznWlsXWukgOoJlOH9YadSQGjtUn2PAXqZHNPklw7b4vMqY9Reyo
f5R2EWbbwX/4rgIVZCYDQW5YIhBEHopyTsR14FWLB6QpoiWLgk+UxWIUQ9VG
mpAIfsPB2LQzBbZCb68U8QhAz3wbAxXyRrtIdb+rmNoVqHnhNBy58stH4neB
r1BQ60RUdBjVDpa2NLKqWJYeglBYi1NYGitSjVgVVKQKoSeLgzjf7L0CSRnV
JGLapSNKIDygof5Svezl3IVL8pxQQ0z4ZFeKHprfJmpLMhY1kLBINkOvimP0
dhP29DhuPFRgABkgh2tBgDbc4SF83MSNKkRaFXQSYSOeymzY7jnouoqzHz7G
nkVIK5Pa1so0nhC8DXwNFXxIMhe+Hf1HalAbKUEQTueXFzZ5n8E8BxSxAhkE
n4kNwnpkoIPgH8wH4Z1MCFHpjhghxbX1Xhsc8kADmojMx1lUOsjRqK2kbeBE
rfKc8GxX5fUjSAwdc88RE0emsLYM1owvNHjeC9EwyJiMpt8lnKKWpfQZe8+x
4b4ySxKt2965t39z8+ZgErXvSY6mRpr39s/PLq4OiNIY7+Lbv768OT+gWGqk
SVxaDQnbyUmK9Ji/A6WEFWADIYyN7YEwgpYBlBQb5vR6AXod4t9GiRP4BHks
ejk1IknthUHBCrXKt9Di0XLLlhiDwmOlmlw40r0nUyMDtoc737N1XdZ72iwW
lksqpstDRHHwPtEmr6YhArQNaSHtmsvpklOD7cIi64w0bl3ZbdgjNkreRffe
Vr5+xb37bMnsbOMONgEfdDSLlvwTrDnrcvtoRkR/frIwg5+Sl86VIojc6K+q
8GZG74gAJJK3wH1R4c4qWQWXKiMaoINl3BIYipQbNKznBDInZc7NV5k8jQV2
zHc/ozjdFYgxHJL/4JV0rXj7yHUOmhE3KteeR8JOXWzyp9e+WLEkiTuAobc7
hWfRw+P1Rd8T4oMieWUhrLnfjaBE5tSmyPZ93OiOYKTl8kBnC3mph4ZoMn4N
Er19BI4BPF8WMr1xUrQLqAVje7JWXYrrR9/AVP2iPSszvnQZiYLQQySzgFCq
tiaIM+k6a/BdUINVVqdwsb3uSz3afRkbC9LG22wlxfcKEp968AanKHHClhgI
F+YRFlqK9KZeevA86DW1CPWNfnp0RHaPKyVbgT225JLAXzssP/meXcw4Jctc
WMJ6uNI2at64wpW7hl5hHX/r4MPlrbx78OHq1lEfSpz9C4hUXcXUzbqEDG7O
y2Ip945nU/yqmGqeSr6f4e987dFcj5LZjzuCQmdUVvd7e3PZLq8gpfe2EpQV
ehWIOZkjWN3xdN3q42yuqUsErehAFSQq0p4V4579uaUunfjak3F+p7wJJSw9
9j574okL1jiNbHRzJQcz3S1XUV3e8/2+9gLpNb1fYrnZTaQOar+0HKyizDgK
myZNay5d+j4JGGhal03oc4dsgqo0cVpDrMelZz0ws1+Bn1iE0rNvFOl6OfXr
zCWc6nfOOmoXQRaPztP0Gyr8AC7uAlAb/QRPvu8TGyu4NWS8c8IpUZjJtq4D
aoXAFowwdxrxd4ok4lzMNYg0EVqvvckgjVBDDql7QbskwTlLYPERzVTSjs3O
DreNJbqGyGmwIXv4jfMU9ZDKYNjNjDOqGRM22DoSGSTmm1Ze1dxdGpPA0KLU
qI40UmqhQhm/BwtJPegSuCpUEywgVdQ8tIHFX43sNRIHext6HFWQanDrjnvS
w5LcbGS4iGRRUc/HkPMe4ax85Ap5n5yk3w6/QvCKXb4v9XJBB/s9/ds58QIu
X/tc12GNP4Sdhl+MeEJEZM2qewM3kOduZzm3VzRhQ9haBsycHsph2HXcKwN+
43ZUZPtVVr0PerijHtMrNB/MpB/tNqRvoTUJ5qzaeZ4l5GeCEF4NCpSDop33
FIOuXG8SKGJJ8cj/xgx9VNNAjKcif+7LCtuqqvzaLoavqH9PbWvg2dEqKG4U
MgDKeKVGT78kQQ2cUVvRM/Mn+ZeAmg6tew5BAMVMv46QeZ9x9MieaiHgb3DL
dAdfn4LIffNCNyGabfTGvjYqqA6D+Z6DJL/OJvIYfmtAdsXxRoWXnGAOSs4I
8NczoQRizRTHjEqCBB61sj1hwI+7iWgwLyv0KX4bhKeukPJPRuHU6xA7huFO
fppB7QhDUXQZeqDNFrSNXqSJUH28tqS3Nt+fMBbaKETNRJJBPv55DMDUl8kN
DDFvSDbuX9eOT6wMT8HJVs62aVmsV8ScxY+7gPknQrpKq6HvXiXU2dH4eHnr
KwoYFVFPXnP87yOLDj2gXKM2sJRv6yOJXmciN5/0sMXKrLtORqJnu99WmdDR
emNRkJ5kdVnwexbEe1bo05M2N76JPfYyoUBBO4RE54a5Zg0ZTo3NL+F4iJfv
LysNW+Y30uITidCF8GgY5N9SkO/wmGNHAsYCMV66pxY9NFaV4HPX9JG7QqTy
K2/iClG+QlrfAyHXVhWkA3jY06xnCwSxl76pXcXVDhlIHB8gkPdDATCwQppM
UZbr6Wn+GYQYbgXvjynx1H7E1aAhwOZrSLIs0mWZW1E2GFeKGm6yj0k7sv7L
s5/PNky/T4UCJAJvqrMVt6FZfqbbzQaLorguzkilVyAULNjlOZyEcbYjy1Rb
mmj6Ybvf+TWoaJIxtX4jTuJw5uTNOUiYS9SVORPGHHtF4NSrcv3mnBLernnB
t7j1p8kkcFMXtmmGabtwLmeVgcCHP5QxGyfXubZAitXlgmAkhfL3UWGGEcTz
uuYCJa9wbGEPwtj9blbjxMgxDeh18Wwh8PnQBskq2xCGLAnXYPRU10InBba7
xCSMzuoseSjKp9ymS6FwbsPbPhhsiwff8Y9Xdr/Fqf/3P/9LXWUWUfifDCR5
OVjrRP+bXSzAKazmpk7Lif6zAWnk5lFflw68y8M9XINQagp1blbV3OY5L/7n
LHkA1bEQVnBgzZVzBB5mxc1/9M+u8Lf5ayv96hJ35MibJ9KGQGxT+CUYKZbx
0YoMKDWLBMEkFIoSF4EvrlUBIkRCMumvJkF79e/bCjT92g9E9d7bi34lin9L
gKGK5fxTfopmbpIHPEhwY5Kkc1l2enRMQviRurn+n9ZHg1PbAf44wzFlvBSE
o5+U2eFLkMsOEBB/HMr3n3FfM/80iOYasNl4kTlQxCe9eeXXWnDaXZ1+Andw
1oHTikjqiWQVZP/4o0gfMTXiVn7Rn5n6dnTbQyJa94noCCfjEp5dapipF/Jb
UrSUnuPuB5YRrgpn2qfAwMdwZbC80nA/EA20noTuElhLCsOI34BPmIUczNR3
o9v1fMnUAyyyKzlH7ObpfvFu6FjhcEv5kQrsX7M2Rd3VZKyemXCUJD7ZHMtV
HrAxoU4ejUhe/D05HBB8PYQ89X/m3DfZYFAAAA==

-->

</rfc>

